Confidentiality Information Security Sample Clauses

Confidentiality Information Security. All information and advice furnished by either party to the other (or obtained by the Sub-Adviser from the Company in connection with providing Services under this Agreement) shall be treated as confidential (“Confidential Information”) and shall not be disclosed to unaffiliated third parties unless requested by a regulatory authority or as otherwise required by law. Information to be treated as Confidential Information includes, without limitation, all “non-public personal information” as defined in Title V of the Xxxxx-Xxxxx Xxxxxx Act and its implementing regulations. The Sub-Adviser and its officers, directors, employees, agents and vendors shall not use the Adviser’s Confidential Information for any purpose other than to provide the Services contracted for in this Agreement for the sole benefit of the Adviser and the Company; provided, however, that the Sub-Adviser will not violate the foregoing if it uses the Adviser’s Confidential Information in connection with other written agreements entered into between the Sub-Adviser and the Adviser or the Adviser’s affiliates, for the sole benefit of the Adviser or its affiliates. The parties shall use appropriate measures to: (i) safeguard the security and confidentiality of Confidential Information; (ii) protect against the destruction, loss, alteration of or unauthorized access to Confidential Information; and (iii) ensure the proper disposal of Confidential Information. In the event that the Sub-Adviser becomes aware of an incident of unauthorized access to, compromise or breach of the Adviser and/or the Company’s Confidential Information, the Sub-Adviser shall immediately notify the Adviser of the incident and shall immediately coordinate with the Adviser to investigate and prevent the incident or mitigate or remedy the effects of the incident. The Sub-Adviser shall provide updates to the Adviser of the Sub-Adviser’s efforts to correct or prevent such compromise, as frequently as necessary to keep the Adviser fully apprised of the investigation and the status of any corrective or remedial steps taken by the Sub-Adviser.
AutoNDA by SimpleDocs
Confidentiality Information Security. (a) Each party shall keep confidential any information relating to the other party’s business (“Confidential Information”). Confidential Information shall include (a) any data or information that is competitively sensitive material, and not generally known to the public, including, but not limited to, information about product plans, marketing strategies, finances, operations, customer relationships, customer profiles, customer lists, sales estimates, business plans, and internal performance results relating to the past, present or future business activities of the Administrator, a Fund or BNY Mellon and their respective subsidiaries and affiliated companies; (b) any scientific or technical information, design, process, procedure, formula, or improvement that is commercially valuable and secret in the sense that its confidentiality affords a Fund or BNY Mellon a competitive advantage over its competitors; (c) all confidential or proprietary concepts, documentation, reports, data, specifications, computer software, source code, object code, flow charts, databases, inventions, know-how, and trade secrets, whether or not patentable or copyrightable; and (d) anything designated as confidential. Notwithstanding the foregoing, information shall not be Confidential Information and shall not be subject to such confidentiality obligations if it: (a) is already known to the receiving party at the time it is obtained; (b) is or becomes publicly known or available through no wrongful act of the receiving party; (c) is rightfully received from a third party who, to the best of the receiving party’s knowledge, is not under a duty of confidentiality; (d) is released by the protected party to a third party without restriction; (e) is requested or required to be disclosed by the receiving party pursuant to a court order, subpoena, governmental or regulatory agency request or law; (f) is relevant to the defense of any claim or cause of action asserted against the receiving party; (g) is Fund information provided by BNY Mellon in connection with an independent third party compliance or other review; (h) is released for Fund business purposes in connection with the provision of services to or for the Fund under this Agreement; or (i) has been or is independently developed or obtained by the receiving party. The provisions of this Section 21 shall survive termination of this Agreement for a period of one (1) year after such termination. (b) The Bank of New York Mellon Corporat...
Confidentiality Information Security. (a) The Ceding Company and the Reinsurer agree to hold each other’s Confidential Information in strictest confidence and to take all reasonable steps to ensure that Confidential Information is not disclosed in any form by any means by such Party, its Affiliates or by any of its representative or subcontractors to third parties of any kind, other than the representatives performing services for such Party who need access to such Confidential Information in the course and scope of providing such services, except as is authorized by the other Party in advance and in compliance with all Applicable Law. If any Confidential Information needs to be disclosed as required by Applicable Law or court order, the disclosing Party shall (if permitted by Applicable Law) provide prompt notice to the other Party prior to such disclosure so that such other party may (at its expense) seek a protection order or other appropriate remedy which is necessary to protect its interest. (b) The Reinsurer may use the Ceding Company’s Confidential Information; provided that such party shall establish and maintain safeguards against the unauthorized access, destruction, loss or alteration of the Ceding Company’s Confidential Information which are no less rigorous than those maintained by the Reinsurer for its own information of a similar nature (but not less than using a reasonable standard of care), and in compliance with the terms of the Privacy and Security Addendum attached hereto as Exhibit D. (c) Without limiting the generality of the foregoing, with respect to any NonPublic Personal Information received by the Reinsurer, the Reinsurer will (i) comply with Applicable Law and the reasonable terms of the Ceding Company privacy notice; (ii) retain, use, process, and disclose all Non-Public Personal Information accessed, obtained, developed, or produced by Reinsurer only to monitor the Ceding Company’s compliance with the terms of this Agreement, perform its obligations under this Agreement and as specifically permitted by this Agreement, or as otherwise instructed in writing from time-to-time by Ceding Company, and not for any other purpose; (iii) refrain from selling such Non-Public Personal Information or using such Non-Public Personal Information for any other purpose, including for its own commercial purpose or benefit; (iv) ensuring that all Non-Public Personal Information created by the Reinsurer on behalf of the Ceding Company is not subject to unauthorized alteration or delet...
Confidentiality Information Security. (a) Each parties agrees to keep confidential and not disclose to any third parties any information (in any form or medium, written or oral, and whether or not labeled or otherwise identified as confidential) given to or received from the other party, directly or indirectly, as a result of or in connection with performance under this Agreement (including the Exhibits hereto). The foregoing obligation of confidentiality does not apply to information which (i) is or becomes available to the public generally, other than as a result of disclosure by the receiving party, directly or indirectly, in breach of the terms of this Agreement, (ii) becomes available to the receiving party from a source other than the disclosing party, including without limitation prior to the date hereof, provided that such source is not (to the knowledge of the receiving party after reasonable inquiry) bound by a confidentiality agreement with or does not have a contractual, legal or fiduciary obligation of confidentiality to the disclosing party or any other person with respect to such information, or (iii) has been independently acquired or developed by the receiving party without using any information of the receiving party or violating any of its obligations under this Agreement, but the receiving party shall have the burden of proof to demonstrate such independence. Neither party will use any information of the other party that is subject to the foregoing obligation of confidentiality for its own benefit or the benefit of a third party, and will take all reasonable measures to protect the confidentiality of such information and prevent its disclosure to others. (b) The purchase by Buyer of Vendor's Products or Services does not authorize Vendor to use the name of or make reference to Buyer, or any of its affiliated companies or subsidiaries, for any purpose in any releases for public or private dissemination, nor shall Vendor divulge or use in any advertisement or publication any specifications, data, or other information pertaining to or relating to this usage without prior written approval. (c) Vendor shall implement appropriate administrative, technical, and physical safeguards and other appropriate measures to protect the security, confidentiality and integrity of all confidential information, including but not limited to nonpublic and/or personal information relating to customers or employees of Buyer. These measures shall be designed to ensure and anticipate any threats or h...
Confidentiality Information Security. Users of the Einaudi Center information network systems, including computer, telephone, fax, printers and photocopiers as well as data storage devices, should have no expectation of privacy of information. The I:/Drive is provided to employees to facilitate storage of business-related sensitive data and should not be used as a private location for storage of personal and non-Cornell information. Confidentiality & Information Security Policy 5.10: xxxx://xxx.xxx.xxxxxxx.xxx/dfa/treasurer/policyoffice/policies/volumes/informationtech/infosecurity.cfm Policy 4.12: xxxx://xxx.xxx.xxxxxxx.xxx/dfa/treasurer/policyoffice/policies/volumes/governance/data.cfm Cornell University Policy 5.10 “Information Security of Institutional Information” defines the following information as Level 1 (confidential), Level 2 (restricted), or Level 3 (public): Level 1 Confidential: social security number, credit card number, driver’s license number, bank account number, patient treatment information
Confidentiality Information Security. (a) Your company and its Affiliates (as defined below) and their respective Personnel will: (i) protect and not disclose the terms of this Agreement and any other information that is identified as confidential or that reasonably should be considered confidential to Amazon regardless of when received (“Confidential Information”); (ii) use Confidential Information only to fulfill your company’s obligations under this Agreement; and
Confidentiality Information Security. Assent cannot be held responsible for information submitted by the customer and we do not vet, redact or censor content. However, Assent staff will avoid, as far as possible, including any personal or confidential information within the ticket responses. Further information on our Information Security Policy can be found on xxx.xxxxxx0.xxx.
AutoNDA by SimpleDocs
Confidentiality Information Security a. Your company and its Affiliates and their respective Personnel will: i. protect and not disclose the terms of this Agreement and any other information that is identified as confidential or that reasonably should be considered confidential to Amazon regardless of when received (“Confidential Information”); ii. use Confidential Information only to fulfill your company’s obligations under this Agreement; and iii. promptly return to Amazon or destroy Confidential Information when requested by us or when this Agreement is terminated or not renewed. b. Your company will not, without our prior written consent, (i) use any trademark or other Proprietary Right of Amazon (except as otherwise expressly permitted by this Agreement), (ii) issue press releases or other publicity relating to Amazon, the Program, or this Agreement, or (ii) refer to Amazon or its Affiliates in any advertising or promotional materials. c. Your company will use any personally identifiable information concerning Amazon’s customers, suppliers, employees, or contractors, including names, addresses, e-mail addresses, telephone numbers, building or community access codes, and financial information (collectively, “Personal Information” and together with Confidential Information, collectively, “Amazon Information”), solely for the purpose of providing Services. Your company will not transfer, disclose or sell Personal Information and will not develop lists of or aggregate Personal Information. Your company will delete Personal Information upon our request. d. Your company will comply with Amazon’s standards for protecting the confidentiality and integrity of all transmission of Amazon Information. Your company will immediately inform Amazon of any actual or suspected unauthorized access, collection, acquisition, use, transmission, disclosure, corruption, or loss of Amazon Information (each, an “Information Security Incident”), and your company will cooperate with Amazon and take all actions required by Amazon to rectify all Information Security Incidents. If your company is required by Law to retain archival copies of Amazon Information for tax or similar regulatory purposes, your company will store the Amazon Information in accordance with Amazon’s information security policies in effect from time to time.
Confidentiality Information Security. In addition to any other agreement and/or terms governing confidentiality between the parties, Service Provider will adopt adequate (taking into account the nature of Processing and the information available to Service Provider) technical and organizational measures reasonably necessary to secure the Personal Data and to prevent unauthorized access, alteration or loss of the same, including measures required by applicable Data Protection Laws. Service Provider will also ensure confidentiality of the Personal Data, including taking appropriate measures to ensure the same of its Personnel and Sub-processors. At the reasonable written request of FireEye, Service Provider will provide the former with a comprehensive and up-to-date data protection and security concept for the FireEye Personal Data obtained under the Agreement while performing the Services under the Agreement.
Confidentiality Information Security 
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!